Authentication group key management method based on identity

A technology of group key and management method, applied in the field of identity-based authentication group key sharing and management, can solve the problems of poor calculation effectiveness and heavy network communication burden, and achieve the effect of improving communication and calculation.

Inactive Publication Date: 2009-05-13
XIDIAN UNIV
View PDF0 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (2) There is implicit key escrow, which is sometimes undesirable; (3) The key negotiation process generally requires O(n 1gn) or O(n) rounds of communication, and the network communication burden is relatively large; (4 ) calculation efficiency is poor, generally O(n 1gn) or O(n) pairing operations are required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication group key management method based on identity
  • Authentication group key management method based on identity
  • Authentication group key management method based on identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] One, the mathematical theory used in the present invention and technical term description:

[0027] 1. Hash function

[0028] The Hash function is a function that changes an input message of arbitrary length into an output message of fixed length, and this output is called the Hash value of the message. A secure Hash function should at least meet the following conditions: ①The input length is arbitrary; ②The output length is fixed, generally at least 128 bits long, in order to resist birthday attacks; ③For each given input, it can be easily ④Given the description of the Hash function, it is computationally infeasible to find two different input messages Hash to the same value, or given the description of the Hash function and a randomly selected message, It is computationally infeasible to find another message that is different from this message such that they hash to the same value. The Hash function is mainly used for integrity verification and improving the validit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a identity-based authentication group key management method which comprises the following steps: embedding ID into key with bilinear pairing in elliptic curve; generating Ci as part of main key ui according to the secret key and ID of group member ui by key generating center, and transmitting the Ci to ui through overt channel; generating main key according to Ci and its own secret key by each group member ui; calculating overt key verification information according to Hash value of main key and over key by each group member, and broadcasting the link between over key and verification information inside the group; calculating the secret value sharing with left and right neighbors when the received information is verified to be true by each group member, and calculating the group member information Xi included in group session key according to the secret value, and then broadcasting the Xi inside the group; calculating group session key K according to all Xj, j=1, ...,n, by each group member. The invention has the advantages of no key escrow and no need of secure channel, which can be applied in coordination and distributed network as secure reliable group communication.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular, an identity-based authentication group key sharing and management method, which can be used for safe and reliable group communication in collaborative and distributed network applications, such as multicast, audio Video conferencing, online collaborative games. Background technique [0002] It is well known in the industry that in many collaborative and distributed network applications, such as multicast, audio and video conferencing, and network collaborative games, safe and reliable group communication is a key issue. Group session key sharing and management can solve this problem well. Basic security services provided by a secure group communication system include data confidentiality, integrity, membership authentication, and access control. A common way to achieve restricted access to information is to encrypt group messages. These security services can be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 吕锡香李晖张卫东
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products